Hay
Date
Dec. 9, 2024, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   26.592596] ==================================================================
[   26.593834] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.594496] Free of addr fff00000c657c000 by task kunit_try_catch/225
[   26.595093] 
[   26.595909] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.597043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.597607] Hardware name: linux,dummy-virt (DT)
[   26.598228] Call trace:
[   26.598627]  show_stack+0x20/0x38 (C)
[   26.599292]  dump_stack_lvl+0x8c/0xd0
[   26.599964]  print_report+0x118/0x5e0
[   26.600567]  kasan_report_invalid_free+0xb0/0xd8
[   26.601261]  __kasan_mempool_poison_object+0x14c/0x150
[   26.602026]  mempool_free+0x28c/0x328
[   26.602684]  mempool_double_free_helper+0x150/0x2e0
[   26.603580]  mempool_kmalloc_large_double_free+0xb8/0x110
[   26.604312]  kunit_try_run_case+0x14c/0x3d0
[   26.604968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.605743]  kthread+0x24c/0x2d0
[   26.606294]  ret_from_fork+0x10/0x20
[   26.607063] 
[   26.607368] The buggy address belongs to the physical page:
[   26.608029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   26.609030] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.609864] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   26.610733] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.611730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.612552] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   26.613460] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.614298] head: 0bfffe0000000002 ffffc1ffc3195f01 ffffffffffffffff 0000000000000000
[   26.615319] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.616452] page dumped because: kasan: bad access detected
[   26.617128] 
[   26.617421] Memory state around the buggy address:
[   26.618074]  fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.619100]  fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.619829] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.620769]                    ^
[   26.621181]  fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.621941]  fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.622642] ==================================================================
[   26.632154] ==================================================================
[   26.633269] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.634147] Free of addr fff00000c657c000 by task kunit_try_catch/227
[   26.634904] 
[   26.635509] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.636904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.637431] Hardware name: linux,dummy-virt (DT)
[   26.638052] Call trace:
[   26.638515]  show_stack+0x20/0x38 (C)
[   26.639152]  dump_stack_lvl+0x8c/0xd0
[   26.639869]  print_report+0x118/0x5e0
[   26.640452]  kasan_report_invalid_free+0xb0/0xd8
[   26.641171]  __kasan_mempool_poison_pages+0xe0/0xe8
[   26.641783]  mempool_free+0x24c/0x328
[   26.642200]  mempool_double_free_helper+0x150/0x2e0
[   26.643135]  mempool_page_alloc_double_free+0xb4/0x110
[   26.643781]  kunit_try_run_case+0x14c/0x3d0
[   26.644438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.645102]  kthread+0x24c/0x2d0
[   26.645714]  ret_from_fork+0x10/0x20
[   26.646204] 
[   26.646526] The buggy address belongs to the physical page:
[   26.647381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10657c
[   26.648463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.649278] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   26.650121] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.650997] page dumped because: kasan: bad access detected
[   26.651565] 
[   26.651892] Memory state around the buggy address:
[   26.652463]  fff00000c657bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.653659]  fff00000c657bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.654437] >fff00000c657c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.655374]                    ^
[   26.655760]  fff00000c657c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.657028]  fff00000c657c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.657771] ==================================================================
[   26.532676] ==================================================================
[   26.533975] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e0
[   26.534664] Free of addr fff00000c1288000 by task kunit_try_catch/223
[   26.536543] 
[   26.536913] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.538048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.538799] Hardware name: linux,dummy-virt (DT)
[   26.539379] Call trace:
[   26.539672]  show_stack+0x20/0x38 (C)
[   26.540135]  dump_stack_lvl+0x8c/0xd0
[   26.540535]  print_report+0x118/0x5e0
[   26.541476]  kasan_report_invalid_free+0xb0/0xd8
[   26.542347]  check_slab_allocation+0xd4/0x108
[   26.543174]  __kasan_mempool_poison_object+0x78/0x150
[   26.543992]  mempool_free+0x28c/0x328
[   26.544662]  mempool_double_free_helper+0x150/0x2e0
[   26.545391]  mempool_kmalloc_double_free+0xb8/0x110
[   26.546131]  kunit_try_run_case+0x14c/0x3d0
[   26.546882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.547807]  kthread+0x24c/0x2d0
[   26.548821]  ret_from_fork+0x10/0x20
[   26.549474] 
[   26.549938] Allocated by task 223:
[   26.550541]  kasan_save_stack+0x3c/0x68
[   26.551260]  kasan_save_track+0x20/0x40
[   26.552114]  kasan_save_alloc_info+0x40/0x58
[   26.552740]  __kasan_mempool_unpoison_object+0x11c/0x180
[   26.553466]  remove_element+0x130/0x1f8
[   26.553965]  mempool_alloc_preallocated+0x58/0xc0
[   26.554670]  mempool_double_free_helper+0x94/0x2e0
[   26.555356]  mempool_kmalloc_double_free+0xb8/0x110
[   26.556518]  kunit_try_run_case+0x14c/0x3d0
[   26.557120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.557784]  kthread+0x24c/0x2d0
[   26.558310]  ret_from_fork+0x10/0x20
[   26.558875] 
[   26.559224] Freed by task 223:
[   26.559835]  kasan_save_stack+0x3c/0x68
[   26.560470]  kasan_save_track+0x20/0x40
[   26.561006]  kasan_save_free_info+0x4c/0x78
[   26.561500]  __kasan_mempool_poison_object+0xc0/0x150
[   26.562234]  mempool_free+0x28c/0x328
[   26.563533]  mempool_double_free_helper+0x100/0x2e0
[   26.564136]  mempool_kmalloc_double_free+0xb8/0x110
[   26.564845]  kunit_try_run_case+0x14c/0x3d0
[   26.565486]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.566213]  kthread+0x24c/0x2d0
[   26.566781]  ret_from_fork+0x10/0x20
[   26.567604] 
[   26.567969] The buggy address belongs to the object at fff00000c1288000
[   26.567969]  which belongs to the cache kmalloc-128 of size 128
[   26.569268] The buggy address is located 0 bytes inside of
[   26.569268]  128-byte region [fff00000c1288000, fff00000c1288080)
[   26.570579] 
[   26.570960] The buggy address belongs to the physical page:
[   26.572315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101288
[   26.573247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.574059] page_type: f5(slab)
[   26.574653] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   26.575598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   26.576713] page dumped because: kasan: bad access detected
[   26.577365] 
[   26.577743] Memory state around the buggy address:
[   26.578290]  fff00000c1287f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.579288]  fff00000c1287f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.580397] >fff00000c1288000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.581403]                    ^
[   26.582332]  fff00000c1288080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.583139]  fff00000c1288100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.584293] ==================================================================

[   26.779110] ==================================================================
[   26.781247] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   26.782313] Free of addr ffff888102960f00 by task kunit_try_catch/242
[   26.783672] 
[   26.783849] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.785972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.786759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.787784] Call Trace:
[   26.787998]  <TASK>
[   26.788459]  dump_stack_lvl+0x73/0xb0
[   26.789270]  print_report+0xd1/0x640
[   26.790014]  ? __virt_addr_valid+0x1db/0x2d0
[   26.790412]  ? mempool_double_free_helper+0x185/0x370
[   26.791137]  ? kasan_complete_mode_report_info+0x64/0x200
[   26.792111]  ? mempool_double_free_helper+0x185/0x370
[   26.792797]  kasan_report_invalid_free+0xc0/0xf0
[   26.793624]  ? mempool_double_free_helper+0x185/0x370
[   26.794447]  ? mempool_double_free_helper+0x185/0x370
[   26.794947]  ? mempool_double_free_helper+0x185/0x370
[   26.795652]  check_slab_allocation+0x101/0x130
[   26.796361]  __kasan_mempool_poison_object+0x91/0x1d0
[   26.797080]  mempool_free+0x2ec/0x380
[   26.797590]  mempool_double_free_helper+0x185/0x370
[   26.798204]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.798975]  mempool_kmalloc_double_free+0xb1/0x100
[   26.799970]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   26.800638]  ? __switch_to+0x5d9/0xf60
[   26.801093]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.801807]  ? __pfx_mempool_kfree+0x10/0x10
[   26.802474]  ? __pfx_read_tsc+0x10/0x10
[   26.803007]  ? ktime_get_ts64+0x86/0x230
[   26.803772]  kunit_try_run_case+0x1b3/0x490
[   26.804536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.805154]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.805744]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.806480]  ? __kthread_parkme+0x82/0x160
[   26.806858]  ? preempt_count_sub+0x50/0x80
[   26.807241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.807735]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.808762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.809671]  kthread+0x257/0x310
[   26.810060]  ? __pfx_kthread+0x10/0x10
[   26.810464]  ret_from_fork+0x41/0x80
[   26.811114]  ? __pfx_kthread+0x10/0x10
[   26.811509]  ret_from_fork_asm+0x1a/0x30
[   26.812098]  </TASK>
[   26.812973] 
[   26.813175] Allocated by task 242:
[   26.813760]  kasan_save_stack+0x3d/0x60
[   26.814262]  kasan_save_track+0x18/0x40
[   26.814720]  kasan_save_alloc_info+0x3b/0x50
[   26.815667]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   26.816894]  remove_element+0x11e/0x190
[   26.817421]  mempool_alloc_preallocated+0x4d/0x90
[   26.818078]  mempool_double_free_helper+0x8b/0x370
[   26.818647]  mempool_kmalloc_double_free+0xb1/0x100
[   26.819062]  kunit_try_run_case+0x1b3/0x490
[   26.820018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.821550]  kthread+0x257/0x310
[   26.821954]  ret_from_fork+0x41/0x80
[   26.822327]  ret_from_fork_asm+0x1a/0x30
[   26.822936] 
[   26.823323] Freed by task 242:
[   26.823589]  kasan_save_stack+0x3d/0x60
[   26.824083]  kasan_save_track+0x18/0x40
[   26.824482]  kasan_save_free_info+0x3f/0x60
[   26.825826]  __kasan_mempool_poison_object+0x131/0x1d0
[   26.826698]  mempool_free+0x2ec/0x380
[   26.827342]  mempool_double_free_helper+0x10a/0x370
[   26.828158]  mempool_kmalloc_double_free+0xb1/0x100
[   26.829049]  kunit_try_run_case+0x1b3/0x490
[   26.829604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.830776]  kthread+0x257/0x310
[   26.831471]  ret_from_fork+0x41/0x80
[   26.832052]  ret_from_fork_asm+0x1a/0x30
[   26.832640] 
[   26.833026] The buggy address belongs to the object at ffff888102960f00
[   26.833026]  which belongs to the cache kmalloc-128 of size 128
[   26.835216] The buggy address is located 0 bytes inside of
[   26.835216]  128-byte region [ffff888102960f00, ffff888102960f80)
[   26.836141] 
[   26.836582] The buggy address belongs to the physical page:
[   26.837059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102960
[   26.837989] flags: 0x200000000000000(node=0|zone=2)
[   26.839031] page_type: f5(slab)
[   26.839580] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   26.840235] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000
[   26.841403] page dumped because: kasan: bad access detected
[   26.841841] 
[   26.842000] Memory state around the buggy address:
[   26.842706]  ffff888102960e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.843977]  ffff888102960e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.844384] >ffff888102960f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.845967]                    ^
[   26.846540]  ffff888102960f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.847269]  ffff888102961000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   26.848278] ==================================================================
[   26.914851] ==================================================================
[   26.916079] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   26.917157] Free of addr ffff888102b40000 by task kunit_try_catch/246
[   26.917680] 
[   26.918058] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.920194] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.920950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.922235] Call Trace:
[   26.922679]  <TASK>
[   26.923726]  dump_stack_lvl+0x73/0xb0
[   26.924888]  print_report+0xd1/0x640
[   26.925271]  ? __virt_addr_valid+0x1db/0x2d0
[   26.926163]  ? mempool_double_free_helper+0x185/0x370
[   26.927825]  ? kasan_addr_to_slab+0x11/0xa0
[   26.928303]  ? mempool_double_free_helper+0x185/0x370
[   26.929382]  kasan_report_invalid_free+0xc0/0xf0
[   26.930012]  ? mempool_double_free_helper+0x185/0x370
[   26.931329]  ? mempool_double_free_helper+0x185/0x370
[   26.931811]  __kasan_mempool_poison_pages+0x115/0x130
[   26.932224]  mempool_free+0x290/0x380
[   26.932768]  mempool_double_free_helper+0x185/0x370
[   26.933490]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.934049]  ? finish_task_switch.isra.0+0x153/0x700
[   26.934652]  mempool_page_alloc_double_free+0xac/0x100
[   26.935393]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   26.936251]  ? __switch_to+0x5d9/0xf60
[   26.936928]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   26.937870]  ? __pfx_mempool_free_pages+0x10/0x10
[   26.938827]  ? __pfx_read_tsc+0x10/0x10
[   26.939261]  ? ktime_get_ts64+0x86/0x230
[   26.940038]  kunit_try_run_case+0x1b3/0x490
[   26.941064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.942045]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.942695]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.943685]  ? __kthread_parkme+0x82/0x160
[   26.944503]  ? preempt_count_sub+0x50/0x80
[   26.945503]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.945796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.947373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.948357]  kthread+0x257/0x310
[   26.948741]  ? __pfx_kthread+0x10/0x10
[   26.949525]  ret_from_fork+0x41/0x80
[   26.952426]  ? __pfx_kthread+0x10/0x10
[   26.953252]  ret_from_fork_asm+0x1a/0x30
[   26.953982]  </TASK>
[   26.954350] 
[   26.954839] The buggy address belongs to the physical page:
[   26.955730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40
[   26.956867] flags: 0x200000000000000(node=0|zone=2)
[   26.957457] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   26.958269] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.958935] page dumped because: kasan: bad access detected
[   26.959230] 
[   26.959400] Memory state around the buggy address:
[   26.960391]  ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.961456]  ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.962184] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.962836]                    ^
[   26.963173]  ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.963766]  ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.964258] ==================================================================
[   26.855015] ==================================================================
[   26.856706] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   26.857413] Free of addr ffff888102b40000 by task kunit_try_catch/244
[   26.857923] 
[   26.858106] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G    B            N 6.13.0-rc2-next-20241209 #1
[   26.858970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.859506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.860271] Call Trace:
[   26.860943]  <TASK>
[   26.861488]  dump_stack_lvl+0x73/0xb0
[   26.862017]  print_report+0xd1/0x640
[   26.862533]  ? __virt_addr_valid+0x1db/0x2d0
[   26.862996]  ? mempool_double_free_helper+0x185/0x370
[   26.863637]  ? kasan_addr_to_slab+0x11/0xa0
[   26.864032]  ? mempool_double_free_helper+0x185/0x370
[   26.864898]  kasan_report_invalid_free+0xc0/0xf0
[   26.865772]  ? mempool_double_free_helper+0x185/0x370
[   26.866486]  ? mempool_double_free_helper+0x185/0x370
[   26.867066]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   26.867715]  mempool_free+0x2ec/0x380
[   26.868694]  mempool_double_free_helper+0x185/0x370
[   26.869254]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   26.869920]  ? finish_task_switch.isra.0+0x153/0x700
[   26.870438]  mempool_kmalloc_large_double_free+0xb1/0x100
[   26.870892]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   26.872029]  ? __switch_to+0x5d9/0xf60
[   26.872660]  ? __pfx_mempool_kmalloc+0x10/0x10
[   26.873113]  ? __pfx_mempool_kfree+0x10/0x10
[   26.873742]  ? __pfx_read_tsc+0x10/0x10
[   26.874089]  ? ktime_get_ts64+0x86/0x230
[   26.874637]  kunit_try_run_case+0x1b3/0x490
[   26.875113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.876020]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.877168]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.878482]  ? __kthread_parkme+0x82/0x160
[   26.879327]  ? preempt_count_sub+0x50/0x80
[   26.880408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.881136]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.881871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.882766]  kthread+0x257/0x310
[   26.883832]  ? __pfx_kthread+0x10/0x10
[   26.884223]  ret_from_fork+0x41/0x80
[   26.884770]  ? __pfx_kthread+0x10/0x10
[   26.885669]  ret_from_fork_asm+0x1a/0x30
[   26.886186]  </TASK>
[   26.887077] 
[   26.887848] The buggy address belongs to the physical page:
[   26.888500] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b40
[   26.889416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   26.890582] flags: 0x200000000000040(head|node=0|zone=2)
[   26.891033] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.892750] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.893896] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   26.894551] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   26.896043] head: 0200000000000002 ffffea00040ad001 ffffffffffffffff 0000000000000000
[   26.896625] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   26.897807] page dumped because: kasan: bad access detected
[   26.898472] 
[   26.898740] Memory state around the buggy address:
[   26.899910]  ffff888102b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.900445]  ffff888102b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.900889] >ffff888102b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.901912]                    ^
[   26.902190]  ffff888102b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.903347]  ffff888102b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   26.904068] ==================================================================